(b) Linking and dynamic graph t=

Size: px
Start display at page:

Download "(b) Linking and dynamic graph t="

Transcription

1 1 (a) (b) (c) Supplementary Figure 1: Controlling a directed tree of seven nodes. To control the whole network we need at least 3 driver nodes, which can be either {1, 3, 4} (a), {1, 2, 4} (b) or {1, 2, 3} (c), predicted by the structural control theory. If instead we want to control a subset of nodes, e.g. {1, 2, 5, 7} (the green nodes) with a minimum set of nodes, we need to solve the target control problem. The upper bound obtained by structural control theory indicates that we need at least three driver nodes (the same sets shown in (a), (b), and (c)). But, in reality, we only need one driver node (node 1), which can be obtained from both the k-walk theory and the greedy algorithm.

2 2 (a) Target control (b) Linking and dynamic graph t= u (c) Greedy algorithm Iteration 4 Iteration 3 Iteration 2 Iteration 1 Supplementary Figure 2: Greedy algorithm is closely related to the concept of linking in dynamic graphs. (a) Node set {1, 2, 4, 6, 7} can be controlled by node 1. (b) Node 1 can control node set {1, 2, 4, 6, 7} because there are 4 disjoint linkings from node 1 to nodes {1, 2, 4, 6, 7}. (c) Node set {1, 2, 4, 6, 7} can be controlled by node 1 identified from the greedy algorithm.

3 F random local f Supplementary Figure 3: Relative size of the controllable subsystem vs. the fraction of target nodes. F denotes the relative size of the controllable subsystems. f denotes the target node fraction. The calculation is done for ER networks with N = 1000 and mean degree k = 4. The result is averaged over 6 realizations. The error bars are of the size of the symbols.

4 E random local ρ Supplementary Figure 4: The effect of an emerging hub on the target control efficiency. Starting from an ER random network with mean degree k = 10 and number of nodes N = 1000 for 200 realizations, we rewire a ρ fraction of nodes to a particular node i. Node i hence will emerge as a hub if ρ is very high. The error bars are of the size of the symbols.

5 High in degree High out degree α h D /αr D f Supplementary Figure 5: Controlling hubs in scale-free networks. Here we calculate the ratio between αd h (the target controllability parameter of controlling the top f fraction of highest degree nodes) and αd r (the target controllability parameter of random control a f fraction of nodes).

6 α D N=2000 N= f Supplementary Figure 6: Finite size effect on target controllability. For ER networks with mean degree k = 5.6 and two different sizes, we show the normalized fraction of driver nodes (α D ) in function of the target node fraction f for random node selection scheme.

7 7 Supplementary Note 1: Target Control We consider linear time-invariant (LTI) systems of the form [1, 2] ẋ = Ax + Bu, y = Cx. (1) where x R N, y R S and u R M are the state vector, output vector and control inputs respectively. The state matrix, output matrix and input matrix are given, respectively, by A R N N, C R S N and B R N M. We will denote the linear control system Supplementary Eq. (1) as a triplet (A, B, C). The dimension of its controllable subspace C is denoted as dim(c) = d(a, B, C). Definition 1 (Output controllability). A system is output controllable if we can move its output from any initial condition to any final condition in a finite time interval with a suitable control input. Theorem 1 (Output controllability theorem [2]). The LTI system (A, B, C) is output controllable if and only if its output controllability matrix has full row rank d(a, B, C) = rank[c(b, AB, A 2 B,..., A N 1 B)] = S. (2) Target control can be viewed as a special output control problem, where y = Cx is the state of a target node set {x c1,..., x cs }. In other words, the matrix C R S N satisfies C i,ci = 1 and all other elements are zeros, where c i (i = 1, 2,..., S) is ith target node. In practical terms, target controllability can be posed as identifying the minimum set of driver nodes such that Supplementary Eq. (2) is satisfied. To directly apply Supplementary Eq. (2) we need to know all the matrix elements in A, B and C, which for most networks are either unknown or known only approximately. Even if we know all the matrix elements in A, B and C, it is still a computationally prohibitive task to identify the minimum set of driver nodes for large networks, requiring to test 2 N 1 distinct node combinations. To bypass the need to know the link weights, we adopt the structural control theory developed decades ago [3]. The system (A, B) is structurally controllable if it is possible to choose the non-zero elements (or weights) in A and B such that the system satisfies Kalman s rank condition [3]. A structurally controllable system can be shown to be controllable for almost all weight combinations, except for some pathological cases with zero measure. Thus, structural controllability helps us to overcome our inherently incomplete knowledge of the link weights in A and B.

8 8 Definition 2 (Structurally equivalent). Two matrices A = (a ij ) and  = (â ij) of the same size are said to be structurally equivalent if their non-zero entries coincide in position, i.e., a ij = 0 iff â ij = 0 for all i and j. Two systems (A, B, C) and (Â, ˆB, Ĉ) are said to be structurally equivalent if the corresponding pairs of matrices are. Definition 3 (Generic dimension). The generic dimension gd(a, B, C) of the output state space is defined as gd(a, B, C) = max {d(â, ˆB, Ĉ)}, (3) Â, ˆB,Ĉ where Â, ˆB, Ĉ are structurally equivalent of A, B, C respectively. Consider a directed network G(V, E) with N = V nodes and L = E links. If there exists a directed link from node i to node j, then a ji 0 in the state matrix A. A target node set of size S is denoted as C = {c 1, c 2,..., c S } V. In order to control the S target nodes, we need to drive M nodes B = {b 1, b 2,, b M } V. Without loss of generality, we consider C = {1, 2,..., S} and the output state vector y = [x 1, x 2,..., x S ], then the output matrix can be written as C = [I, 0], where I is an identity matrix of S S, and 0 is an S (N S) matrix with all entries zero. We denote the state variables of the remaining (non-target) nodes as z = [x S+1, x S+2,..., x N ]. Then we can decompose ẋ = Ax + Bu as where A = A(11) A (12) A (21) A (22) ẏ = A(11) A (12) y + B 1 u (4) ż A (21) A (22) z, A (11) represents the topology of S target nodes in C, A (22) represents the topology of the N S non-target nodes in set C := V \ C. The non-zero entries in A (21) and A (12) represent the links between target and non-target nodes. B 2

9 9 Supplementary Note 2: k-walk theory Consider a directed tree-like network that has at most one directed path from any node u to any other node v. (Note that if there is only one node with in-degree 0, i.e., a root node, such a directed tree is called an arborescence in graph theory.) The main result of k-walk theory is that for linear time-invariant dynamics on such directed trees a single node u can fully control a set of target nodes provided the path length from node u to each target node is unique. This result enables us to develop an efficient algorithm to identify the controllable subsystems of any single node in directed trees. Here, controllable subsystems of node i mean the maximum sets of nodes that can be fully controlled by directly controlling node i only. Note that for directed tree-like networks k-walk theory can find some controllable subsystems that would be totally missed by the previous method based on control centrality [4]. For example, as shown in Supplementary Figure 1, by calculating the control centrality of node 1 we can only obtain one controllable subsystem {1, 3, 6, 7}. Using k-walk theory, however, we can identify the following controllable subsystems {1, 3, 6, 7}, {1, 2, 5, 7}, {1, 2, 6, 7}, {1, 4, 5, 7}, {1, 4, 6, 7}, and {1, 3, 5, 7}. In this section, we prove the main result of k-walk theory and provide an efficient algorithm to find all controllable subsytems of any single node in a directed tree-like network. To achieve that, we first introduce some basic concepts. Though some of the concepts are originally defined on undirected networks, in this section we focus on directed networks or digraphs. Definition 4 (Reachable set). The reachable set R i of node i contains all the nodes that node i can reach through directed paths. We denote r i = R i as the total number of nodes that node i can reach. Definition 5 (Controllable set). A controllable set C i,α of node i contains a maximum set of nodes that can be fully controlled by node i. Here, α [1, s i ] and s i is the totoal number of controllable sets of node i. Note that C i,α = c i, α [1, s i ] and c i is the control centrality of node i, i.e., the dimension of the largest controllable subspace if we control node i only. One can show that s i α=1 C i,α R i, i.e., the union of all the controllable sets of node i is just the reachable set of node i. The reachable set R i of node i can be obtained by a breadth first search, from which r i can be calculated as well. The control centrality and one controllable set of node i can be calculated by solving the maximum-weight cycle partition problem via linear programming [4]. Yet, there was no efficient method to enumerate all the controllable sets of a given node.

10 10 Definition 6 (Walks). A walk is an alternating sequence of nodes and links in the form v 0, e 1, v 1,..., v n 1, e n, v n such that for 1 i n, the link e i = (v i 1 v i ) has source node v i 1 and target node v i. A walk is closed if its first and last nodes are the same, and open if they are different. The length of a walk is its number of links. Definition 7 (Path, simple path, cycle). (i) A path is an open walk. (ii) A simple path is an open walk in which no nodes are repeated. (iii) A cycle is a closed walk that starts and ends at the same node but otherwise has no repeated nodes or links. For a directed network G with adjacency matrix A = [a ij ], a ij = 1 if there is a link (v i v j ) and 0 otherwise. We denote d ij as the length of a walk from node i to node j. We have d ij = k if the (i, j) entry of matrix A k is non-zero. For general directed networks, d ij might have multiples values, because there could be many different walks connecting node i and node j. For a directed tree, all the paths are simple and consequently d ij is single-valued for any node pair (i, j) in T. Theorem 2. For a directed tree, node i can control all the c i nodes in the set C i,α = {i 1,..., i ci }, where d iik = k 1 and k [1, c i ]. Note that i 1 denotes node i itself. Proof. According to structural output controllability theorem [5], node i can control all the nodes in C i,α, if the generic dimension of the output controllability matrix C := c i,α [b i, Ab i, A 2 b i,..., A N 1 b i ] has rank c i, i.e., gd(c) = gd(c i,α [b i, Ab i, A 2 b i,..., A N 1 b i ]) = c i. (5) Here, c i,α = I(C i,α ) denotes a c i N matrix that contains the {i 1,..., i ci }th rows of the identify matrix I, b i is ith column of the identity matrix. Note that the N 1 vector A k b i contains non-zero entries corresponding to those nodes with d ij = k 1. Since the network is a directed tree and the set C i,α contains only one node that satisfies d ij = k 1, we have c i,α A k b i = β k I ik where β k is a non-zero constant, and I ik represents the i k -column of the identity matrix. Hence, we have gd(c) = gd[β 1 I i1,..., β ci I ici ]. (6) Since I i1,..., I ici are all independent, gd(c) = c i and the subsystem represented by the set C i,α is controllable by controlling node i only. Now we propose an efficient algorithm to find all the controllable subsystems of node i in a directed tree: (1) Calculate the distance d ij between node i and any other node j in the tree. (2) According to its distance from i, classify a node j from a distance-class D where all the nodes in

11 11 D have the same distance to node i. (3) Assume there are in total P distance-classes D 1,, D P, with size D 1,, D P respectively. Choosing one node from each distance-class D will form a controllable set of node i. Note that the total number of controllable sets of node i is given by D 1 D P.

12 12 Supplementary Note 3: Upper bound, lower bound, and greedy algorithm In this section, we derive the upper and lower bounds of the number of driver nodes required for target control. We also provide a greedy algorithm to find an approximately minimum set of driver nodes for target control. Theorem 3 (Structural state variable controllability theorem [6]). Consider a structural system in the form of Supplementary Eq. (4). The target state y is structurally controllable if the target nodes are covered by a cactus structure underlying the directed network corresponding to the controlled system (A, B). Theorem 3 enables us to derive the upper bound of the minimum number of control inputs needed for target control. Algorithm 1 (Upper bound). (1) According to the minimum input theorem [7], we can find at least one minimum set D of driver nodes to control the whole network. Each driver node is connected to a root of a cactus. (2) Calculate the minimal number of cacti needed to cover all the target nodes. The lower bound of the minimum number of driver nodes for target control can be derived based on the concept of dilation in structural control theory [3]: two target nodes that share the same incoming neighbor set need at least two independent control inputs. Hence we can formalize the target control problem as a bipartite matching problem, see Figure 1(d) in the main paper. Algorithm 2 (Lower bound). (1) Build a bipartite graph B, where the right side R consists of all the target nodes, and the left side L consists of all the nodes that can reach the target nodes. There is a link between node u L and v R if there is a link u v in the original directed network G. (2) Find the maximum matching in B. The unmatched nodes in R are just the driver nodes. One can show that the minimal number of driver nodes for target control is no less than the number of driver nodes derived from the lower bound algorithm. The greedy algorithm is based on the lower bound algorithm. Actually, the latter can be considered as the first step of the former. Denote that target node set as C 0. Algorithm 3 (Greedy algorithm). (1) At step t = 0, use algorithm 2 to find the lower bound of driver nodes to control the target nodes, i.e., the unmatched nodes in the right side of the bipartite graph, denoted as D 0. Then we can find all the matched nodes on the left side as the new target nodes C 1.

13 13 (2) If C 1 =, stop, we obtain the driver node set D 0, and number of driver nodes P D = D 0. If C 1, go to (3). (3) At step t 1, use algorithm 3 to find the lower bound of driver nodes for the new target nodes C t, the unmatched nodes in the right side are the driver node set D t. Then we can find all the matched nodes on the left side as the new target nodes C t+1. Go to (4). (4) If C t+1 =, stop, we obtain the driver node set t j=0 D j, and number of driver nodes P D = t j=0 D j. If C t+1, go to (3). Figure 1(d) in the main paper illustrates the process of greedy algorithm. Note that the greey algorithm is closely related to the concepts of linking and dynamic graph in structural control theory [8]. Definition 8 (Dynamic graph and linking [8]). A directed graph associated with A, B, and N is the dynamic graph Ḡ = ḠN defined on the set of nodes V = V A V B where V A = V A,1... V A,N, VB = V B,0... V B,N 1, V A,t = {v it : i = 1,..., n}, t = 1,..., N, and V B,t = {v n+j,t : j = 1,..., m}, t = 0,..., N 1. The set of directed edges of Ḡ is given by {v jtv i,t+1 : a ij 0, t = 1,..., N 1} {v n+j,t v i,t+1 : b ij 0, t = 0,..., N 1}. A collection of node disjoint paths from V B to V A,N is called linking. The size of a linking is the number of paths in it. The sufficiency of the above greedy algorithm can be proved by invoking Theorem 1 of [8] (Supplementary Fig. 2). Note that the greedy algorithm may find a set of driver nodes that can actually control a larger node set than the target node set itself.

14 14 Supplementary Note 4: The effect of hubs and network size In order to understand if the peaks observed in Figure 5 of the main text might be due to the emergence of hubs, we perform the following analysis. First, we start from an ER network with node set V and randomly select one node i V. Then we randomly select a ρ fraction nodes from the node set V \ i and rewire those nodes to node i, preserving the in-degree and out-degree of those nodes. Hence the mean degree of the network is fixed. We calculate the target control efficiency of the rewired network. As shown in Supplementary Figure 4, the result implies that the presence of hubs increases the target control efficiency. Second, we consider scale-free networks and study the case of choosing the top f fraction of highest in- or out-degree nodes as the target nodes. The results are shown in Supplementary Figure 5, where αd h denotes the target controllability parameter of controlling the top f fraction of the highest in- or out-degree nodes and αd r denote the target controllability parameter of randomly chosen f fraction of nodes. We find that, in general, controlling hubs requires less driver nodes. Interestingly, if we choose a small fraction of nodes (f 60%), controlling high out-degree nodes is easier than controlling high in-degree nodes, but the opposite is true if we control a large fraction of nodes (f 70%).

15 15 Supplementary References [1] Aström, K. J. and Murray, R. M. Feedback systems: an introduction for scientists and engineers. Princeton university press, (2010). [2] Dorf, R. C. Modern control systems. Addison-Wesley Longman Publishing Co., Inc., (1991). [3] Lin, C.-T. Structural controllability. Automatic Control, IEEE Transactions on 19(3), (1974). [4] Liu, Y.-Y., Slotine, J.-J., and Barabási, A.-L. Control centrality and hierarchical structure in complex networks. Plos one 7(9), e44459 (2012). [5] Murota, K. and Poljak, S. Note on a graph-theoretic criterion for structural output controllability. Automatic Control, IEEE Transactions on 35(8), (1990). [6] Blackhall, L. and Hill, D. J. On the structural controllability of networks of linear systems. In 2nd IFAC Workshop on Distributed Estimation and Control in Networked Systems, , (2010). [7] Liu, Y.-Y., Slotine, J.-J., and Barabási, A.-L. Controllability of complex networks. Nature 473, (2011). [8] Poljak, S. On the generic dimension of controllable subspaces. Automatic Control, IEEE Transactions on 35(3), (1990).

2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to

2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to 2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to be connected if it is not disconnected. A subset of

More information

Bipartite graphs unique perfect matching.

Bipartite graphs unique perfect matching. Generation of graphs Bipartite graphs unique perfect matching. In this section, we assume G = (V, E) bipartite connected graph. The following theorem states that if G has unique perfect matching, then

More information

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering

More information

Math 170- Graph Theory Notes

Math 170- Graph Theory Notes 1 Math 170- Graph Theory Notes Michael Levet December 3, 2018 Notation: Let n be a positive integer. Denote [n] to be the set {1, 2,..., n}. So for example, [3] = {1, 2, 3}. To quote Bud Brown, Graph theory

More information

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch.

Copyright 2007 Pearson Addison-Wesley. All rights reserved. A. Levitin Introduction to the Design & Analysis of Algorithms, 2 nd ed., Ch. Iterative Improvement Algorithm design technique for solving optimization problems Start with a feasible solution Repeat the following step until no improvement can be found: change the current feasible

More information

Matching Theory. Figure 1: Is this graph bipartite?

Matching Theory. Figure 1: Is this graph bipartite? Matching Theory 1 Introduction A matching M of a graph is a subset of E such that no two edges in M share a vertex; edges which have this property are called independent edges. A matching M is said to

More information

Dual-fitting analysis of Greedy for Set Cover

Dual-fitting analysis of Greedy for Set Cover Dual-fitting analysis of Greedy for Set Cover We showed earlier that the greedy algorithm for set cover gives a H n approximation We will show that greedy produces a solution of cost at most H n OPT LP

More information

Introduction III. Graphs. Motivations I. Introduction IV

Introduction III. Graphs. Motivations I. Introduction IV Introduction I Graphs Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Graph theory was introduced in the 18th century by Leonhard Euler via the Königsberg

More information

Structured System Theory

Structured System Theory Appendix C Structured System Theory Linear systems are often studied from an algebraic perspective, based on the rank of certain matrices. While such tests are easy to derive from the mathematical model,

More information

Graphs. Introduction To Graphs: Exercises. Definitions:

Graphs. Introduction To Graphs: Exercises. Definitions: Graphs Eng.Jehad Aldahdooh Introduction To Graphs: Definitions: A graph G = (V, E) consists of V, a nonempty set of vertices (or nodes) and E, a set of edges. Each edge has either one or two vertices associated

More information

Chapter 2 Graphs. 2.1 Definition of Graphs

Chapter 2 Graphs. 2.1 Definition of Graphs Chapter 2 Graphs Abstract Graphs are discrete structures that consist of vertices and edges connecting some of these vertices. Graphs have many applications in Mathematics, Computer Science, Engineering,

More information

Course Introduction / Review of Fundamentals of Graph Theory

Course Introduction / Review of Fundamentals of Graph Theory Course Introduction / Review of Fundamentals of Graph Theory Hiroki Sayama sayama@binghamton.edu Rise of Network Science (From Barabasi 2010) 2 Network models Many discrete parts involved Classic mean-field

More information

Graph Theory. Part of Texas Counties.

Graph Theory. Part of Texas Counties. Graph Theory Part of Texas Counties. We would like to visit each of the above counties, crossing each county only once, starting from Harris county. Is this possible? This problem can be modeled as a graph.

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

Size of a problem instance: Bigger instances take

Size of a problem instance: Bigger instances take 2.1 Integer Programming and Combinatorial Optimization Slide set 2: Computational Complexity Katta G. Murty Lecture slides Aim: To study efficiency of various algo. for solving problems, and to classify

More information

Copyright 2000, Kevin Wayne 1

Copyright 2000, Kevin Wayne 1 Linear Time: O(n) CS 580: Algorithm Design and Analysis 2.4 A Survey of Common Running Times Merge. Combine two sorted lists A = a 1,a 2,,a n with B = b 1,b 2,,b n into sorted whole. Jeremiah Blocki Purdue

More information

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur Lecture : Graphs Rajat Mittal IIT Kanpur Combinatorial graphs provide a natural way to model connections between different objects. They are very useful in depicting communication networks, social networks

More information

Paths, Flowers and Vertex Cover

Paths, Flowers and Vertex Cover Paths, Flowers and Vertex Cover Venkatesh Raman M. S. Ramanujan Saket Saurabh Abstract It is well known that in a bipartite (and more generally in a König) graph, the size of the minimum vertex cover is

More information

CHAPTER 3 FUZZY RELATION and COMPOSITION

CHAPTER 3 FUZZY RELATION and COMPOSITION CHAPTER 3 FUZZY RELATION and COMPOSITION The concept of fuzzy set as a generalization of crisp set has been introduced in the previous chapter. Relations between elements of crisp sets can be extended

More information

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department CS473-Algorithms I Lecture 3-A Graphs Graphs A directed graph (or digraph) G is a pair (V, E), where V is a finite set, and E is a binary relation on V The set V: Vertex set of G The set E: Edge set of

More information

Introduction to Mathematical Programming IE406. Lecture 16. Dr. Ted Ralphs

Introduction to Mathematical Programming IE406. Lecture 16. Dr. Ted Ralphs Introduction to Mathematical Programming IE406 Lecture 16 Dr. Ted Ralphs IE406 Lecture 16 1 Reading for This Lecture Bertsimas 7.1-7.3 IE406 Lecture 16 2 Network Flow Problems Networks are used to model

More information

ON THE STRONGLY REGULAR GRAPH OF PARAMETERS

ON THE STRONGLY REGULAR GRAPH OF PARAMETERS ON THE STRONGLY REGULAR GRAPH OF PARAMETERS (99, 14, 1, 2) SUZY LOU AND MAX MURIN Abstract. In an attempt to find a strongly regular graph of parameters (99, 14, 1, 2) or to disprove its existence, we

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

arxiv: v2 [math.oc] 29 Jan 2015

arxiv: v2 [math.oc] 29 Jan 2015 Minimum Cost Input/Output Design for Large-Scale Linear Structural Systems Sérgio Pequito, Soummya Kar A. Pedro Aguiar, 1 arxiv:1407.3327v2 [math.oc] 29 Jan 2015 Abstract In this paper, we provide optimal

More information

Chapter 3. Quadric hypersurfaces. 3.1 Quadric hypersurfaces Denition.

Chapter 3. Quadric hypersurfaces. 3.1 Quadric hypersurfaces Denition. Chapter 3 Quadric hypersurfaces 3.1 Quadric hypersurfaces. 3.1.1 Denition. Denition 1. In an n-dimensional ane space A; given an ane frame fo;! e i g: A quadric hypersurface in A is a set S consisting

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

BACKGROUND: A BRIEF INTRODUCTION TO GRAPH THEORY

BACKGROUND: A BRIEF INTRODUCTION TO GRAPH THEORY BACKGROUND: A BRIEF INTRODUCTION TO GRAPH THEORY General definitions; Representations; Graph Traversals; Topological sort; Graphs definitions & representations Graph theory is a fundamental tool in sparse

More information

Varying Applications (examples)

Varying Applications (examples) Graph Theory Varying Applications (examples) Computer networks Distinguish between two chemical compounds with the same molecular formula but different structures Solve shortest path problems between cities

More information

Part 4. Decomposition Algorithms Dantzig-Wolf Decomposition Algorithm

Part 4. Decomposition Algorithms Dantzig-Wolf Decomposition Algorithm In the name of God Part 4. 4.1. Dantzig-Wolf Decomposition Algorithm Spring 2010 Instructor: Dr. Masoud Yaghini Introduction Introduction Real world linear programs having thousands of rows and columns.

More information

Math 778S Spectral Graph Theory Handout #2: Basic graph theory

Math 778S Spectral Graph Theory Handout #2: Basic graph theory Math 778S Spectral Graph Theory Handout #: Basic graph theory Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved the Königsberg Bridge problem: Is it possible

More information

Introduction to Graph Theory

Introduction to Graph Theory Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex

More information

REGULAR GRAPHS OF GIVEN GIRTH. Contents

REGULAR GRAPHS OF GIVEN GIRTH. Contents REGULAR GRAPHS OF GIVEN GIRTH BROOKE ULLERY Contents 1. Introduction This paper gives an introduction to the area of graph theory dealing with properties of regular graphs of given girth. A large portion

More information

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize.

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize. Cornell University, Fall 2017 CS 6820: Algorithms Lecture notes on the simplex method September 2017 1 The Simplex Method We will present an algorithm to solve linear programs of the form maximize subject

More information

Lecture 15: The subspace topology, Closed sets

Lecture 15: The subspace topology, Closed sets Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

Material handling and Transportation in Logistics. Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena

Material handling and Transportation in Logistics. Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena Material handling and Transportation in Logistics Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena Introduction to Graph Theory Graph Theory As Mathematical

More information

V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V

V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V -93-11. Graph Theory Example: V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V b e f V={a, b, c, d, e, f, g} a c d f E={(a,b), (b,c), (c,a),... } Note: (a,

More information

CME 305: Discrete Mathematics and Algorithms Instructor: Reza Zadeh HW#3 Due at the beginning of class Thursday 03/02/17

CME 305: Discrete Mathematics and Algorithms Instructor: Reza Zadeh HW#3 Due at the beginning of class Thursday 03/02/17 CME 305: Discrete Mathematics and Algorithms Instructor: Reza Zadeh (rezab@stanford.edu) HW#3 Due at the beginning of class Thursday 03/02/17 1. Consider a model of a nonbipartite undirected graph in which

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

What is linear programming (LP)? NATCOR Convex Optimization Linear Programming 1. Solving LP problems: The standard simplex method

What is linear programming (LP)? NATCOR Convex Optimization Linear Programming 1. Solving LP problems: The standard simplex method NATCOR Convex Optimization Linear Programming 1 Julian Hall School of Mathematics University of Edinburgh jajhall@ed.ac.uk 14 June 2016 What is linear programming (LP)? The most important model used in

More information

v V Question: How many edges are there in a graph with 10 vertices each of degree 6?

v V Question: How many edges are there in a graph with 10 vertices each of degree 6? ECS20 Handout Graphs and Trees March 4, 2015 (updated 3/9) Notion of a graph 1. A graph G = (V,E) consists of V, a nonempty set of vertices (or nodes) and E, a set of pairs of elements of V called edges.

More information

Graphs. Pseudograph: multiple edges and loops allowed

Graphs. Pseudograph: multiple edges and loops allowed Graphs G = (V, E) V - set of vertices, E - set of edges Undirected graphs Simple graph: V - nonempty set of vertices, E - set of unordered pairs of distinct vertices (no multiple edges or loops) Multigraph:

More information

On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments

On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments Electronic Journal of Graph Theory and Applications 3 (2) (2015), 191 196 On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments Rafael Del Valle

More information

AMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12.

AMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12. AMS 550.47/67: Graph Theory Homework Problems - Week V Problems to be handed in on Wednesday, March : 6, 8, 9,,.. Assignment Problem. Suppose we have a set {J, J,..., J r } of r jobs to be filled by a

More information

Minimum sum multicoloring on the edges of trees

Minimum sum multicoloring on the edges of trees Minimum sum multicoloring on the edges of trees Dániel Marx a,1 a Department of Computer Science and Information Theory, Budapest University of Technology and Economics, H-1521 Budapest, Hungary. Abstract

More information

Bipartite Perfect Matching in O(n log n) Randomized Time. Nikhil Bhargava and Elliot Marx

Bipartite Perfect Matching in O(n log n) Randomized Time. Nikhil Bhargava and Elliot Marx Bipartite Perfect Matching in O(n log n) Randomized Time Nikhil Bhargava and Elliot Marx Background Matching in bipartite graphs is a problem that has many distinct applications. Many problems can be reduced

More information

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI Department of Computer Science and Engineering CS6702 - GRAPH THEORY AND APPLICATIONS Anna University 2 & 16 Mark Questions & Answers Year / Semester: IV /

More information

1 Matchings in Graphs

1 Matchings in Graphs Matchings in Graphs J J 2 J 3 J 4 J 5 J J J 6 8 7 C C 2 C 3 C 4 C 5 C C 7 C 8 6 J J 2 J 3 J 4 J 5 J J J 6 8 7 C C 2 C 3 C 4 C 5 C C 7 C 8 6 Definition Two edges are called independent if they are not adjacent

More information

Graphs. The ultimate data structure. graphs 1

Graphs. The ultimate data structure. graphs 1 Graphs The ultimate data structure graphs 1 Definition of graph Non-linear data structure consisting of nodes & links between them (like trees in this sense) Unlike trees, graph nodes may be completely

More information

Number Theory and Graph Theory

Number Theory and Graph Theory 1 Number Theory and Graph Theory Chapter 6 Basic concepts and definitions of graph theory By A. Satyanarayana Reddy Department of Mathematics Shiv Nadar University Uttar Pradesh, India E-mail: satya8118@gmail.com

More information

ACO Comprehensive Exam March 19 and 20, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 19 and 20, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms Bottleneck edges in a flow network: Consider a flow network on a directed graph G = (V,E) with capacities c e > 0 for e E. An edge e E is called a bottleneck

More information

CSE 417 Network Flows (pt 4) Min Cost Flows

CSE 417 Network Flows (pt 4) Min Cost Flows CSE 417 Network Flows (pt 4) Min Cost Flows Reminders > HW6 is due Monday Review of last three lectures > Defined the maximum flow problem find the feasible flow of maximum value flow is feasible if it

More information

Ma/CS 6b Class 2: Matchings

Ma/CS 6b Class 2: Matchings Ma/CS 6b Class 2: Matchings By Adam Sheffer Send anonymous suggestions and complaints from here. Email: adamcandobetter@gmail.com Password: anonymous2 There aren t enough crocodiles in the presentations

More information

Reconstruction of Filament Structure

Reconstruction of Filament Structure Reconstruction of Filament Structure Ruqi HUANG INRIA-Geometrica Joint work with Frédéric CHAZAL and Jian SUN 27/10/2014 Outline 1 Problem Statement Characterization of Dataset Formulation 2 Our Approaches

More information

NATCOR Convex Optimization Linear Programming 1

NATCOR Convex Optimization Linear Programming 1 NATCOR Convex Optimization Linear Programming 1 Julian Hall School of Mathematics University of Edinburgh jajhall@ed.ac.uk 5 June 2018 What is linear programming (LP)? The most important model used in

More information

CME 305: Discrete Mathematics and Algorithms Instructor: Reza Zadeh HW#3 Due at the beginning of class Thursday 02/26/15

CME 305: Discrete Mathematics and Algorithms Instructor: Reza Zadeh HW#3 Due at the beginning of class Thursday 02/26/15 CME 305: Discrete Mathematics and Algorithms Instructor: Reza Zadeh (rezab@stanford.edu) HW#3 Due at the beginning of class Thursday 02/26/15 1. Consider a model of a nonbipartite undirected graph in which

More information

Characterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4)

Characterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4) S-72.2420/T-79.5203 Basic Concepts 1 S-72.2420/T-79.5203 Basic Concepts 3 Characterizing Graphs (1) Characterizing Graphs (3) Characterizing a class G by a condition P means proving the equivalence G G

More information

Math 776 Graph Theory Lecture Note 1 Basic concepts

Math 776 Graph Theory Lecture Note 1 Basic concepts Math 776 Graph Theory Lecture Note 1 Basic concepts Lectured by Lincoln Lu Transcribed by Lincoln Lu Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

CMSC 380. Graph Terminology and Representation

CMSC 380. Graph Terminology and Representation CMSC 380 Graph Terminology and Representation GRAPH BASICS 2 Basic Graph Definitions n A graph G = (V,E) consists of a finite set of vertices, V, and a finite set of edges, E. n Each edge is a pair (v,w)

More information

CHAPTER 8. Copyright Cengage Learning. All rights reserved.

CHAPTER 8. Copyright Cengage Learning. All rights reserved. CHAPTER 8 RELATIONS Copyright Cengage Learning. All rights reserved. SECTION 8.3 Equivalence Relations Copyright Cengage Learning. All rights reserved. The Relation Induced by a Partition 3 The Relation

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

CHAPTER 2. Graphs. 1. Introduction to Graphs and Graph Isomorphism

CHAPTER 2. Graphs. 1. Introduction to Graphs and Graph Isomorphism CHAPTER 2 Graphs 1. Introduction to Graphs and Graph Isomorphism 1.1. The Graph Menagerie. Definition 1.1.1. A simple graph G = (V, E) consists of a set V of vertices and a set E of edges, represented

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection, most

More information

Elements of Graph Theory

Elements of Graph Theory Elements of Graph Theory Quick review of Chapters 9.1 9.5, 9.7 (studied in Mt1348/2008) = all basic concepts must be known New topics we will mostly skip shortest paths (Chapter 9.6), as that was covered

More information

The Structure of Bull-Free Perfect Graphs

The Structure of Bull-Free Perfect Graphs The Structure of Bull-Free Perfect Graphs Maria Chudnovsky and Irena Penev Columbia University, New York, NY 10027 USA May 18, 2012 Abstract The bull is a graph consisting of a triangle and two vertex-disjoint

More information

Paths. Path is a sequence of edges that begins at a vertex of a graph and travels from vertex to vertex along edges of the graph.

Paths. Path is a sequence of edges that begins at a vertex of a graph and travels from vertex to vertex along edges of the graph. Paths Path is a sequence of edges that begins at a vertex of a graph and travels from vertex to vertex along edges of the graph. Formal Definition of a Path (Undirected) Let n be a nonnegative integer

More information

GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016

GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016 GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS ZOÉ HAMEL March 3, 2016 1. Introduction Let G = (V (G), E(G)) be a graph G (loops and multiple edges not allowed) on the set of vertices V (G) and the set

More information

3.1 Basic Definitions and Applications. Chapter 3. Graphs. Undirected Graphs. Some Graph Applications

3.1 Basic Definitions and Applications. Chapter 3. Graphs. Undirected Graphs. Some Graph Applications Chapter 3 31 Basic Definitions and Applications Graphs Slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley All rights reserved 1 Undirected Graphs Some Graph Applications Undirected graph G = (V,

More information

Mathematics of Networks II

Mathematics of Networks II Mathematics of Networks II 26.10.2016 1 / 30 Definition of a network Our definition (Newman): A network (graph) is a collection of vertices (nodes) joined by edges (links). More precise definition (Bollobàs):

More information

Cluster Analysis. Mu-Chun Su. Department of Computer Science and Information Engineering National Central University 2003/3/11 1

Cluster Analysis. Mu-Chun Su. Department of Computer Science and Information Engineering National Central University 2003/3/11 1 Cluster Analysis Mu-Chun Su Department of Computer Science and Information Engineering National Central University 2003/3/11 1 Introduction Cluster analysis is the formal study of algorithms and methods

More information

A note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs

A note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs A note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs Jian Shen Department of Mathematics Southwest Texas State University San Marcos, TX 78666 email: js48@swt.edu Raphael Yuster

More information

Small Survey on Perfect Graphs

Small Survey on Perfect Graphs Small Survey on Perfect Graphs Michele Alberti ENS Lyon December 8, 2010 Abstract This is a small survey on the exciting world of Perfect Graphs. We will see when a graph is perfect and which are families

More information

Lecture 22 Tuesday, April 10

Lecture 22 Tuesday, April 10 CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 22 Tuesday, April 10 GRAPH THEORY Directed Graphs Directed graphs (a.k.a. digraphs) are an important mathematical modeling tool in Computer Science,

More information

Part II. Graph Theory. Year

Part II. Graph Theory. Year Part II Year 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2017 53 Paper 3, Section II 15H Define the Ramsey numbers R(s, t) for integers s, t 2. Show that R(s, t) exists for all s,

More information

1 Linear programming relaxation

1 Linear programming relaxation Cornell University, Fall 2010 CS 6820: Algorithms Lecture notes: Primal-dual min-cost bipartite matching August 27 30 1 Linear programming relaxation Recall that in the bipartite minimum-cost perfect matching

More information

4. Simplicial Complexes and Simplicial Homology

4. Simplicial Complexes and Simplicial Homology MATH41071/MATH61071 Algebraic topology Autumn Semester 2017 2018 4. Simplicial Complexes and Simplicial Homology Geometric simplicial complexes 4.1 Definition. A finite subset { v 0, v 1,..., v r } R n

More information

15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018

15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 In this lecture, we describe a very general problem called linear programming

More information

A graph is finite if its vertex set and edge set are finite. We call a graph with just one vertex trivial and all other graphs nontrivial.

A graph is finite if its vertex set and edge set are finite. We call a graph with just one vertex trivial and all other graphs nontrivial. 2301-670 Graph theory 1.1 What is a graph? 1 st semester 2550 1 1.1. What is a graph? 1.1.2. Definition. A graph G is a triple (V(G), E(G), ψ G ) consisting of V(G) of vertices, a set E(G), disjoint from

More information

The Ordered Covering Problem

The Ordered Covering Problem The Ordered Covering Problem Uriel Feige Yael Hitron November 8, 2016 Abstract We introduce the Ordered Covering (OC) problem. The input is a finite set of n elements X, a color function c : X {0, 1} and

More information

Lecture 6: Graph Properties

Lecture 6: Graph Properties Lecture 6: Graph Properties Rajat Mittal IIT Kanpur In this section, we will look at some of the combinatorial properties of graphs. Initially we will discuss independent sets. The bulk of the content

More information

Chapter 3. Graphs. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.

Chapter 3. Graphs. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. Chapter 3 Graphs Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 1 3.1 Basic Definitions and Applications Undirected Graphs Undirected graph. G = (V, E) V = nodes. E

More information

DM545 Linear and Integer Programming. Lecture 2. The Simplex Method. Marco Chiarandini

DM545 Linear and Integer Programming. Lecture 2. The Simplex Method. Marco Chiarandini DM545 Linear and Integer Programming Lecture 2 The Marco Chiarandini Department of Mathematics & Computer Science University of Southern Denmark Outline 1. 2. 3. 4. Standard Form Basic Feasible Solutions

More information

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI

DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI DHANALAKSHMI COLLEGE OF ENGINEERING, CHENNAI Department of Computer Science and Engineering CS6702 - GRAPH THEORY AND APPLICATIONS Anna University 2 & 16 Mark Questions & Answers Year / Semester: IV /

More information

When does a digraph admit a doubly stochastic adjacency matrix?

When does a digraph admit a doubly stochastic adjacency matrix? When does a digraph admit a doubly stochastic adjacency matrix? Bahman Gharesifard and Jorge Cortés Abstract Digraphs with doubly stochastic adjacency matrices play an essential role in a variety of cooperative

More information

The Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs

The Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs The Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs Frankie Smith Nebraska Wesleyan University fsmith@nebrwesleyan.edu May 11, 2015 Abstract We will look at how to represent

More information

Chapter Design Techniques for Approximation Algorithms

Chapter Design Techniques for Approximation Algorithms Chapter 2 Design Techniques for Approximation Algorithms I N THE preceding chapter we observed that many relevant optimization problems are NP-hard, and that it is unlikely that we will ever be able to

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Clustering: Classic Methods and Modern Views

Clustering: Classic Methods and Modern Views Clustering: Classic Methods and Modern Views Marina Meilă University of Washington mmp@stat.washington.edu June 22, 2015 Lorentz Center Workshop on Clusters, Games and Axioms Outline Paradigms for clustering

More information

A PARAMETRIC SIMPLEX METHOD FOR OPTIMIZING A LINEAR FUNCTION OVER THE EFFICIENT SET OF A BICRITERIA LINEAR PROBLEM. 1.

A PARAMETRIC SIMPLEX METHOD FOR OPTIMIZING A LINEAR FUNCTION OVER THE EFFICIENT SET OF A BICRITERIA LINEAR PROBLEM. 1. ACTA MATHEMATICA VIETNAMICA Volume 21, Number 1, 1996, pp. 59 67 59 A PARAMETRIC SIMPLEX METHOD FOR OPTIMIZING A LINEAR FUNCTION OVER THE EFFICIENT SET OF A BICRITERIA LINEAR PROBLEM NGUYEN DINH DAN AND

More information

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 36

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 36 CS 473: Algorithms Ruta Mehta University of Illinois, Urbana-Champaign Spring 2018 Ruta (UIUC) CS473 1 Spring 2018 1 / 36 CS 473: Algorithms, Spring 2018 LP Duality Lecture 20 April 3, 2018 Some of the

More information

Reducing Clocks in Timed Automata while Preserving Bisimulation

Reducing Clocks in Timed Automata while Preserving Bisimulation Reducing Clocks in Timed Automata while Preserving Bisimulation Shibashis Guha Chinmay Narayan S. Arun-Kumar Indian Institute of Technology Delhi {shibashis, chinmay, sak}@cse.iitd.ac.in arxiv:1404.6613v2

More information

Chapter 3. Graphs CLRS Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.

Chapter 3. Graphs CLRS Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. Chapter 3 Graphs CLRS 12-13 Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 25 3.4 Testing Bipartiteness Bipartite Graphs Def. An undirected graph G = (V, E) is bipartite

More information

Indexable and Strongly Indexable Graphs

Indexable and Strongly Indexable Graphs Proceedings of the Pakistan Academy of Sciences 49 (2): 139-144 (2012) Copyright Pakistan Academy of Sciences ISSN: 0377-2969 Pakistan Academy of Sciences Original Article Indexable and Strongly Indexable

More information

PCP and Hardness of Approximation

PCP and Hardness of Approximation PCP and Hardness of Approximation January 30, 2009 Our goal herein is to define and prove basic concepts regarding hardness of approximation. We will state but obviously not prove a PCP theorem as a starting

More information

Approximation Algorithms for Geometric Intersection Graphs

Approximation Algorithms for Geometric Intersection Graphs Approximation Algorithms for Geometric Intersection Graphs Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 700108, India. Outline

More information

Ordinary Differential Equation (ODE)

Ordinary Differential Equation (ODE) Ordinary Differential Equation (ODE) INTRODUCTION: Ordinary Differential Equations play an important role in different branches of science and technology In the practical field of application problems

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

by conservation of flow, hence the cancelation. Similarly, we have

by conservation of flow, hence the cancelation. Similarly, we have Chapter 13: Network Flows and Applications Network: directed graph with source S and target T. Non-negative edge weights represent capacities. Assume no edges into S or out of T. (If necessary, we can

More information